Analysis
-
max time kernel
144s -
max time network
157s -
platform
windows10-2004_x64 -
resource
win10v2004-20220901-en -
resource tags
arch:x64arch:x86image:win10v2004-20220901-enlocale:en-usos:windows10-2004-x64system -
submitted
07-11-2022 21:07
Static task
static1
Behavioral task
behavioral1
Sample
PDbfQsNCbKysMm.bat
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
PDbfQsNCbKysMm.bat
Resource
win10v2004-20220812-en
Behavioral task
behavioral3
Sample
mGntZOOiFtyWBy.dll
Resource
win7-20220901-en
Behavioral task
behavioral4
Sample
mGntZOOiFtyWBy.dll
Resource
win10v2004-20220812-en
Behavioral task
behavioral5
Sample
project details.lnk
Resource
win7-20220901-en
General
-
Target
project details.lnk
-
Size
995B
-
MD5
d9257c75c3196e49489be81a63e04cc9
-
SHA1
0caa3985f40ff5eb0c6d590d29654d226669578d
-
SHA256
3a988ed0f3b6dbc49f1e44be071df149c32cb5133c7bad96898ca3cbbf93d83b
-
SHA512
b4eaf6b098c05af6a0d50824e79ded405837e61e4bbdb1a93b802f1f30bc35a14af5db4997d4eb12d77c68f67e6f81ba38047bcd937807949a842d099935a709
Malware Config
Extracted
bumblebee
0711
85.239.52.15:443
85.239.54.192:443
85.239.52.113:443
Signatures
-
Blocklisted process makes network request 6 IoCs
flow pid Process 26 4240 rundll32.exe 35 4240 rundll32.exe 41 4240 rundll32.exe 42 4240 rundll32.exe 43 4240 rundll32.exe 44 4240 rundll32.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\Control Panel\International\Geo\Nation cmd.exe -
Suspicious use of NtCreateThreadExHideFromDebugger 1 IoCs
pid Process 4240 rundll32.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 4788 wrote to memory of 5072 4788 cmd.exe 82 PID 4788 wrote to memory of 5072 4788 cmd.exe 82 PID 5072 wrote to memory of 4240 5072 cmd.exe 83 PID 5072 wrote to memory of 4240 5072 cmd.exe 83
Processes
-
C:\Windows\system32\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\project details.lnk"1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:4788 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c PDbfQsNCbKysMm.bat2⤵
- Suspicious use of WriteProcessMemory
PID:5072 -
C:\Windows\system32\rundll32.exerundll32 mGntZOOiFtyWBy.dll,csvcrun3⤵
- Blocklisted process makes network request
- Suspicious use of NtCreateThreadExHideFromDebugger
PID:4240
-
-